Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
infosec
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
Abhay Negi
Abhay Negi
Abhay Negi
Follow
Feb 11
What It Takes to Build an International Cybersecurity Conference in India (CSA XCON 2026)
#
community
#
cybersecurity
#
infosec
#
security
Comments
Add Comment
2 min read
Why Windows Crashes and How To Build Stable PCs
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Feb 8
Why Windows Crashes and How To Build Stable PCs
#
techtalks
#
infosec
#
cybersecurity
#
computerscience
Comments
Add Comment
7 min read
How Can Alertable Threads and APC Abuse Lead to System Crash
Abhijit Shirwal
Abhijit Shirwal
Abhijit Shirwal
Follow
Feb 5
How Can Alertable Threads and APC Abuse Lead to System Crash
#
cybersecurity
#
infosec
#
microsoft
#
security
Comments
Add Comment
3 min read
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context
Anton Minin Baranovskii
Anton Minin Baranovskii
Anton Minin Baranovskii
Follow
Feb 27
Architectural Asymmetry in Authentication: Part 2 — Risk Before Context
#
security
#
infosec
#
authentication
#
appsec
3
 reactions
Comments
Add Comment
2 min read
DynoWiper update: Technical analysis and attribution
Mark0
Mark0
Mark0
Follow
Feb 2
DynoWiper update: Technical analysis and attribution
#
cybersecurity
#
infosec
#
malware
#
sandworm
Comments
Add Comment
1 min read
OAuth Consent Phishing: When “Allow Access” Becomes the Breach
Daniel Isaac E
Daniel Isaac E
Daniel Isaac E
Follow
Feb 2
OAuth Consent Phishing: When “Allow Access” Becomes the Breach
#
api
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
Add Comment
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
#
cybersecurity
#
infosec
#
malware
#
networksecurity
Comments
Add Comment
1 min read
LDAP Channel Binding and LDAP Signing
Mark0
Mark0
Mark0
Follow
Jan 30
LDAP Channel Binding and LDAP Signing
#
cybersecurity
#
infosec
#
activedirectory
#
ldap
Comments
Add Comment
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Mark0
Mark0
Mark0
Follow
Jan 30
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
#
cybersecurity
#
infosec
#
javascript
#
vulnerability
Comments
Add Comment
1 min read
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
Geoffrey Wenger
Geoffrey Wenger
Geoffrey Wenger
Follow
Feb 12
Stablize Windows By Fixing BIOS, Chipset, And GPU Safely
#
techtalks
#
cybersecurity
#
infosec
#
computerscience
1
 reaction
Comments
Add Comment
6 min read
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing
Liudas
Liudas
Liudas
Follow
Jan 28
Your API Is Leaking Its Server Version. Yes, That’s Still a Thing
#
api
#
cybersecurity
#
infosec
#
security
1
 reaction
Comments
1
 comment
1 min read
The First Full-Scale Cyber War: 4 Years of Lessons
Denis Stetskov
Denis Stetskov
Denis Stetskov
Follow
Jan 25
The First Full-Scale Cyber War: 4 Years of Lessons
#
cybersecurity
#
devops
#
infrastructure
#
infosec
Comments
Add Comment
7 min read
title: The Worst Wi-Fi Security Advice I Found on Facebook 🤦‍♂️ (And Why It's Dangerous)
freerave
freerave
freerave
Follow
Feb 26
title: The Worst Wi-Fi Security Advice I Found on Facebook 🤦‍♂️ (And Why It's Dangerous)
#
security
#
networking
#
infosec
#
cybersecurity
2
 reactions
Comments
Add Comment
2 min read
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
Narendrasahoo
Narendrasahoo
Narendrasahoo
Follow
Jan 21
Why Many Companies Fail SOC 2 Type II and How to Avoid the Same Mistakes
#
cybersecurity
#
infosec
#
datasecurity
Comments
Add Comment
3 min read
Purple Teaming, Or: Why Siloed Teams Fail
Bernie
Bernie
Bernie
Follow
Feb 2
Purple Teaming, Or: Why Siloed Teams Fail
#
cybersecurity
#
devops
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account